Which of the following protocols would be MOST important in preserving digital evidence of criminal activity during an investigation?

A. Change control management
B. Chain of custody
C. Channel escalation
D. MSDS documents

Answer: B. Chain of custody

Computer Science & Information Technology

You might also like to view...

Minimizing data redundancy is one of the benefits of normalization

Indicate whether the statement is true or false

Computer Science & Information Technology

private fields of a base class can be accessed in a derived class

a) by calling private methods declared in the base class b) by calling public or protected methods declared in the base class c) directly d) All of the above

Computer Science & Information Technology